• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1237
  • 167
  • 137
  • 109
  • 83
  • 70
  • 38
  • 38
  • 36
  • 20
  • 18
  • 12
  • 12
  • 12
  • 12
  • Tagged with
  • 2377
  • 641
  • 556
  • 520
  • 508
  • 352
  • 332
  • 308
  • 299
  • 234
  • 234
  • 218
  • 209
  • 199
  • 183
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
231

Aggregation and Privacy in Multi-Relational Databases

Jafer, Yasser 11 April 2012 (has links)
Most existing data mining approaches perform data mining tasks on a single data table. However, increasingly, data repositories such as financial data and medical records, amongst others, are stored in relational databases. The inability of applying traditional data mining techniques directly on such relational database thus poses a serious challenge. To address this issue, a number of researchers convert a relational database into one or more flat files and then apply traditional data mining algorithms. The above-mentioned process of transforming a relational database into one or more flat files usually involves aggregation. Aggregation functions such as maximum, minimum, average, standard deviation, count and sum are commonly used in such a flattening process. Our research aims to address the following question: Is there a link between aggregation and possible privacy violations during relational database mining? In this research we investigate how, and if, applying aggregation functions will affect the privacy of a relational database, during supervised learning, or classification, where the target concept is known. To this end, we introduce the PBIRD (Privacy Breach Investigation in Relational Databases) methodology. The PBIRD methodology combines multi-view learning with feature selection, to discover the potentially dangerous sets of features as hidden within a database. Our approach creates a number of views, which consist of subsets of the data, with and without aggregation. Then, by identifying and investigating the set of selected features in each view, potential privacy breaches are detected. In this way, our PBIRD algorithm is able to discover those features that are correlated with the classification target that may also lead to revealing of sensitive information in the database. Our experimental results show that aggregation functions do, indeed, change the correlation between attributes and the classification target. We show that with aggregation, we obtain a set of features which can be accurately linked to the classification target and used to predict (with high accuracy) the confidential information. On the other hand, the results show that, without aggregation we obtain another different set of potentially harmful features. By identifying the complete set of potentially dangerous attributes, the PBIRD methodology provides a solution where the database designers/owners can be warned, to subsequently perform necessary adjustments to protect the privacy of the relational database. In our research, we also perform a comparative study to investigate the impact of aggregation on the classification accuracy and on the time required to build the models. Our results suggest that in the case where a database consists only of categorical data, aggregation should especially be used with caution. This is due to the fact that aggregation causes a decrease in overall accuracies of the resulting models. When the database contains mixed attributes, the results show that the accuracies without aggregation and with aggregation are comparable. However, even in such scenarios, schemas without aggregation tend to slightly outperform. With regard to the impact of aggregation on the model building time, the results show that, in general, the models constructed with aggregation require shorter building time. However, when the database is small and consists of nominal attributes with high cardinality, aggregation causes a slower model building time.
232

Cryptographic Credentials with Privacy-preserving Biometric Bindings

Bissessar, David 22 January 2013 (has links)
Cryptographic credentials allow user authorizations to be granted and verified. and have such applications as e-Passports, e-Commerce, and electronic cash. This thesis proposes a privacy protecting approach of binding biometrically derived keys to cryptographic credentials to prevent unauthorized lending. Our approach builds on the 2011 work of Adams, offering additional benefits of privacy protection of biometric information, generality on biometric modalities, and performance. Our protocol integrates into Brands’ Digital Credential scheme, and the Anonymous Credentials scheme of Camenisch and Lysyanskaya. We describe a detailed integration with the Digital Credential Scheme and sketch the integration into the Anonymous Credentials scheme. Security proofs for non-transferability, correctness of ownership, and unlinkability are provided for the protocol’s instantiation into Digital Credentials. Our approach uses specialized biometric devices in both the issue and show protocols. These devices are configured with our proposed primitive, the fuzzy ex-tractor indistinguishability adaptor which uses a traditional fuzzy extractor to create and regenerate cryptographic keys from biometric data and IND-CCA2 secure en-cryption protect the generated public data against multiplicity attacks. Pedersen commitments are used to hold the key at issue and show time, and A zero-knowledge proof of knowledge is used to ensure correspondence of key created at issue-time and regenerated at show-time. The above is done in a manner which preserves biometric privacy, as and delivers non-transferability of digital credentials. The biometric itself is not stored or divulged to any of the parties involved in the protocol. Privacy protection in multiple enrollments scenarios is achieved by the fuzzy extractor indistinguishability adapter. The zero knowledge proof of knowledge is used in the showing protocol to prove knowledge of values without divulging them.
233

Get a Room: Private Space and Private People in Old French and Middle English Love Stories

Cooley, Alice 06 August 2010 (has links)
This study explores the way in which one circumstance of daily life in the twelfth to fourteenth centuries—the relative scarcity of private space—influenced the literature of courtly love. It presents the argument that because access to spatial privacy was difficult, although desirable, stories of illicit love affairs carried on under these precarious circumstances had a special appeal. In these narratives we can observe a tendency for emotional privacy to be invested in trusted confidants and servants, and for spies and meddling figures to pose a special danger. Both of these character types are frequently shown to have privileged access to private space as well as to private knowledge. The framework for this study is provided by a discussion of the material background to developing ideas of privacy, which argues for a greater resemblance between medieval and modern concepts in this area than has previously been acknowledged. The remainder of the study is concerned with literary examples. Medieval French adaptations of the Ars Amatoria show subtle changes in emphasis which can be attributed to the different status of privacy in the medieval world as compared to Augustan Rome. The Lais of Marie de France, in particular Guigemar, Yonec, Milun, Eliduc and Lanval, are discussed in relation to the concept of the female household, a specific category of private space within the medieval castle. Three of the romances of Chrétien de Troyes—Cligès, Lancelot and Yvain—present significant variations on the theme of love mediated by third parties and flourishing in private space. Five different versions of the Tristan and Isolt story are discussed, showing their consistent preoccupation with the roles played by helping and hindering figures. The study concludes with a consideration of three works by Chaucer. Troilus and Criseyde gives prominent place to the most fully developed example of a character who mediates between lovers, Criseyde’s notorious uncle Pandarus, while The Miller’s Tale and The Merchant’s Tale both centre on lovers’ quests for privacy, but do so to mock rather than to celebrate the conventions of courtly love.
234

Improving availability awareness with relationship filtering

Davis, Scott M. 06 January 2006
Awareness servers provide information about a person to help observers determine whether a person is available for contact. A trade -off exists in these systems: more sources of information, and higher fidelity in those sources, can improve peoples decisions, but each increase in information reduces privacy. In this thesis, we look at whether the type of relationship between the observer and the person being observed can be used to manage this trade-off. We conducted a survey that asked people what amount of information from different sources that they would disclose to seven different relationship types. We found that in more than half of the cases, people would give different amounts of information to different relationships. We then constructed a prototype system and conducted a Wizard of Oz experiment where we took the system into the real world and observed individuals using it. Our results suggest that awareness servers can be improved by allowing finer-grained control than what is currently available.
235

Improving understanding of website privacy policies

Levy, Stephen Eric 24 January 2005
Machine-readable privacy policies have been developed to help reduce user effort in understanding how websites will use personally identifiable information (PII). The goal of these policies is to enable the user to make informed decisions about the disclosure of personal information in web-based transactions. However, these privacy policies are complex, requiring that a user agent evaluate conformance between the users privacy preferences and the sites privacy policy, and indicate this conformance information to the user. The problem addressed in this thesis is that even with machine-readable policies and current user agents, it is still difficult for users to determine the cause and origin of a conflict between privacy preferences and privacy policies. The problem arises partly because current standards operate at the page level: they do not allow a fine-grained treatment of conformance down to the level of a specific field in a web form. In this thesis the Platform for Privacy Preferences (P3P) is extended to enable field-level comparisons, field-specific conformance displays, and faster access to additional field-specific conformance information. An evaluation of a prototype agent based on these extensions showed that they allow users to more easily understand how the website privacy policy relates to the users privacy preferences, and where conformance conflicts occur.
236

Privacy in the Age of the Internet

Russell, Bronwen Elizabeth 15 April 2009
This paper addresses the claim that there is zero privacy for Canadians on the internet. For the interpersonal computing era 1992 to 2007, the relationship between the three major agents (i.e., individual users, federal government, and business) operating on the internet was examined. Three questions guided the research: how has the popular press educated Canadians about internet privacy? what has been the response of the federal government? how have online companies protected the privacy of Canadians? Content analyses of (a) Macleans magazine, (b) the Privacy Commissioner's Annual Reports to Parliament, (c) and the privacy policies of the most visited websites were conducted. Complex Adaptive Systems theory indicated that privacy is an emergent property arising from the interaction of the agents and that the internet is an environment where the agents' interactions lead to limited privacy.
237

Unceasing occupation : love and survival in three late-twentieth-century Canadian World War II novels

Tzupa, Jill Louise 11 August 2004 (has links)
The unprecedented acts of brutality, persecution, and genocide perpetrated in the Second World War caused ruptures within language, creating a need for both individual and collective re-definitions of love, privacy, truth, and survival. In recent years, there has been a resurgence of Second World War fiction in both Canada and abroad, which suggests a need among contemporary authors to analyse and to understand retrospectively the way World War II has influenced current political and racial divisions. By looking specifically at the romantic relationships depicted in The Ash Garden, The English Patient, and The Walnut Tree, three Canadian World War II novels all written approximately fifty years after the war, this thesis not only examines the question of what is necessary for survival and how the public world of war either enables or inhibits individual survival, but also isolates how race, gender, and the public world influence the characters ability to endure in reciprocal love.
238

Unceasing occupation : love and survival in three late-twentieth-century Canadian World War II novels

Tzupa, Jill Louise 11 August 2004
The unprecedented acts of brutality, persecution, and genocide perpetrated in the Second World War caused ruptures within language, creating a need for both individual and collective re-definitions of love, privacy, truth, and survival. In recent years, there has been a resurgence of Second World War fiction in both Canada and abroad, which suggests a need among contemporary authors to analyse and to understand retrospectively the way World War II has influenced current political and racial divisions. By looking specifically at the romantic relationships depicted in The Ash Garden, The English Patient, and The Walnut Tree, three Canadian World War II novels all written approximately fifty years after the war, this thesis not only examines the question of what is necessary for survival and how the public world of war either enables or inhibits individual survival, but also isolates how race, gender, and the public world influence the characters ability to endure in reciprocal love.
239

Get a Room: Private Space and Private People in Old French and Middle English Love Stories

Cooley, Alice 06 August 2010 (has links)
This study explores the way in which one circumstance of daily life in the twelfth to fourteenth centuries—the relative scarcity of private space—influenced the literature of courtly love. It presents the argument that because access to spatial privacy was difficult, although desirable, stories of illicit love affairs carried on under these precarious circumstances had a special appeal. In these narratives we can observe a tendency for emotional privacy to be invested in trusted confidants and servants, and for spies and meddling figures to pose a special danger. Both of these character types are frequently shown to have privileged access to private space as well as to private knowledge. The framework for this study is provided by a discussion of the material background to developing ideas of privacy, which argues for a greater resemblance between medieval and modern concepts in this area than has previously been acknowledged. The remainder of the study is concerned with literary examples. Medieval French adaptations of the Ars Amatoria show subtle changes in emphasis which can be attributed to the different status of privacy in the medieval world as compared to Augustan Rome. The Lais of Marie de France, in particular Guigemar, Yonec, Milun, Eliduc and Lanval, are discussed in relation to the concept of the female household, a specific category of private space within the medieval castle. Three of the romances of Chrétien de Troyes—Cligès, Lancelot and Yvain—present significant variations on the theme of love mediated by third parties and flourishing in private space. Five different versions of the Tristan and Isolt story are discussed, showing their consistent preoccupation with the roles played by helping and hindering figures. The study concludes with a consideration of three works by Chaucer. Troilus and Criseyde gives prominent place to the most fully developed example of a character who mediates between lovers, Criseyde’s notorious uncle Pandarus, while The Miller’s Tale and The Merchant’s Tale both centre on lovers’ quests for privacy, but do so to mock rather than to celebrate the conventions of courtly love.
240

Next Generation RFID Randomization Protocol

LaValley, Jason 06 December 2011 (has links)
Radio Frequency IDentification (RFID) is a wireless communications technology which allows companies to secure their assets and increase the portability of information. This research was motivated by the increased commercial use of RFID technology. Existing security protocols with high levels of security have high computation requirements, and less intensive protocols can allow a tag to be tracked. The techniques proposed in this thesis result in the increase of ciphertexts available without a significant increase in processing power or storage requirements. The addition of random inputs to the generation of ciphertexts will increase the number of possible results without requiring a more advanced encryption algorithm or an increased number of stored encryption keys. Four methods of altering the plaintext/ciphertext pair (random block, set pattern, random pattern, and indexed placement) are analyzed to determine the effectiveness of each method. The number of ciphertexts generated, generation time, and generation errors were recorded to determine which of the four proposed methods would be the most beneficial in a RFID system. The comparison of these method characteristics determined that the set pattern placement method provided the best solution. The thesis also discusses how RFID transmissions appear to attackers and explains how the random inputs reduce effectiveness of current system attacks. In addition to improving the anonymity of RFID tag transmissions, the concept of authenticating random inputs is also introduced in this thesis. These methods help prevent an adversary from easily associating a tag with its transmissions, thus increasing the security of the RFID system.

Page generated in 0.0245 seconds